#identity-obfuscation

[ follow ]
Digital life
fromwww.dw.com
2 hours ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
Privacy professionals
from404 Media
1 hour ago

Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit

Microsoft, Meta, and Google may be violating California privacy laws by failing to honor user opt-out requests for ad cookies.
#ai
Artificial intelligence
fromFuturism
20 hours ago

Meta Secretly Building a Photorealistic AI Clone of Mark Zuckerberg so No Employee Can Ever Escape His Watchful Eye

Meta CEO Mark Zuckerberg is using AI to create a 3D avatar of himself for employee interaction and feedback.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromFortune
3 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Artificial intelligence
fromFuturism
20 hours ago

Meta Secretly Building a Photorealistic AI Clone of Mark Zuckerberg so No Employee Can Ever Escape His Watchful Eye

Meta CEO Mark Zuckerberg is using AI to create a 3D avatar of himself for employee interaction and feedback.
Artificial intelligence
fromFast Company
3 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromFortune
3 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
#meta
fromTechCrunch
4 days ago
Social media marketing

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

fromFuturism
18 hours ago
Privacy professionals

Huge Group of Experts Warns Meta That Its Pervert Glasses Will Enable Terrible Crimes

fromWIRED
22 hours ago
Privacy technologies

Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators

Social media marketing
fromTechCrunch
4 days ago

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

Meta's Muse Spark AI model aims to revitalize its AI efforts amid concerns over past investments like the metaverse.
Privacy professionals
fromFuturism
18 hours ago

Huge Group of Experts Warns Meta That Its Pervert Glasses Will Enable Terrible Crimes

Meta's Ray-Ban AI glasses face backlash for privacy violations and plans for facial recognition technology, prompting outrage from civil rights groups.
Privacy technologies
fromWIRED
22 hours ago

Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators

Over 70 advocacy organizations demand Meta halt face recognition plans for smart glasses due to privacy and safety concerns.
Europe politics
fromTheregister
1 day ago

Digital sovereignty isn't just a buzzword - it's the future

European governments and companies are prioritizing digital sovereignty due to concerns over US control and dependency.
Marketing tech
fromForbes
1 day ago

How AI Interfaces Are Reshaping Discovery, Trust And Decision Making

The traditional home page is losing its significance as AI assistants reshape how users interact with brands online.
#privacy
Psychology
fromSilicon Canals
1 day ago

Not everyone who keeps their personal life private is guarded. Some people tried sharing openly once, watched it become currency in someone else's conversation, and simply adjusted the distribution list permanently. - Silicon Canals

Privacy often emerges as a response to the violation of trust and openness, not as an inherent trait of individuals.
Psychology
fromSilicon Canals
1 day ago

Not everyone who keeps their personal life private is guarded. Some people tried sharing openly once, watched it become currency in someone else's conversation, and simply adjusted the distribution list permanently. - Silicon Canals

Privacy often emerges as a response to the violation of trust and openness, not as an inherent trait of individuals.
Apple
fromTheregister
5 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Deliverability
fromZDNET
5 days ago

How a burner email can protect your inbox - setting one up one is easy and free

A burner email address protects against spam and phishing by providing a temporary, disposable option for account creation.
Cryptocurrency
fromFortune
5 days ago

The New York Times says it found Satoshi Nakamoto, the inventor of Bitcoin. Not so fast. | Fortune

John Carreyrou claims to have identified Satoshi Nakamoto as British computer scientist Adam Back through circumstantial evidence and business activities.
UX design
fromEntrepreneur
6 days ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
#cybersecurity
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Privacy technologies
fromYahoo Tech
3 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromZDNET
3 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromTechSpot
4 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Privacy technologies
fromYahoo Tech
3 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromZDNET
3 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromTechSpot
4 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Privacy technologies
fromHer Campus
1 day ago

Why Website Cookies Aren't As Sweet As They Sound

Website cookies can raise serious privacy concerns due to their role in tracking user behavior and collecting personal data.
#social-media
Digital life
fromwww.dw.com
2 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Social media marketing
fromHer Campus
4 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Social media marketing
fromSilicon Canals
4 days ago

Psychology says people who never post on social media but check it every day aren't passive - they opted out of the performance while keeping the window, and keeping the window without paying the price is the most rational position available and the one the platform was specifically designed to make feel antisocial - Silicon Canals

Silent scrollers on social media actively choose to observe rather than post, demonstrating discipline and self-control contrary to common perceptions.
Digital life
fromwww.dw.com
2 days ago

Does age verification for social media help protect kids?

Governments are implementing age limits on social media to protect minors, but experts question the effectiveness of such measures.
Social media marketing
fromHer Campus
4 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Social media marketing
fromSilicon Canals
4 days ago

Psychology says people who never post on social media but check it every day aren't passive - they opted out of the performance while keeping the window, and keeping the window without paying the price is the most rational position available and the one the platform was specifically designed to make feel antisocial - Silicon Canals

Silent scrollers on social media actively choose to observe rather than post, demonstrating discipline and self-control contrary to common perceptions.
#data-privacy
Privacy technologies
fromArs Technica
5 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Privacy technologies
fromZDNET
3 weeks ago

My personal data has been leaked several times - this service helped clean it all up

Data removal services like DeleteMe help protect personal information from being sold online after data breaches.
Privacy technologies
fromArs Technica
5 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Privacy technologies
fromZDNET
3 weeks ago

My personal data has been leaked several times - this service helped clean it all up

Data removal services like DeleteMe help protect personal information from being sold online after data breaches.
Privacy professionals
fromEngadget
20 hours ago

Meta warned by dozens of organizations that facial recognition on its smart glasses would empower predators

Civil rights organizations urge Meta to abandon facial recognition in smart glasses due to risks of empowering stalkers and predators.
Photography
fromWIRED
2 weeks ago

Your Photos Are Probably Giving Away Your Location. Here's How to Stop That

Photos contain metadata like EXIF data, including location, which can be useful but may compromise privacy when shared.
Information security
fromTechCrunch
20 hours ago

FBI announces takedown of phishing operation that targeted thousands of victims | TechCrunch

The FBI dismantled a global phishing operation, W3LL, targeting over 17,000 victims and facilitating over $20 million in fraud.
Privacy professionals
fromSecurityWeek
1 day ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
fromArs Technica
19 hours ago

Your tech support company runs scams. Stop-or disguise with more fraud?

Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Privacy professionals
fromPopular Science
3 days ago

How to stop your smart TV from tracking you

Smart TVs are capable of tracking user data, including viewing habits and app usage, which can lead to personalized advertising and content recommendations. Users may prefer to limit this tracking to protect their privacy.
Privacy technologies
#google
#generative-ai
Digital life
fromBig Think
2 weeks ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
2 weeks ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Information security
fromTechzine Global
1 day ago

Anthropic's Mythos preview: why the human layer matters more, not less

Anthropic's Mythos Preview autonomously discovers and exploits high-severity vulnerabilities, achieving a 72.4% success rate in exploit chaining.
#privacy-policy
Privacy professionals
fromRoute Fifty
1 day ago

Getting privacy policy right in a competitive digital economy

State and local leaders aim to balance privacy protection with economic competitiveness, as inconsistent privacy laws can hinder business operations and consumer trust.
Privacy professionals
fromRoute Fifty
1 day ago

Getting privacy policy right in a competitive digital economy

State and local leaders aim to balance privacy protection with economic competitiveness, as inconsistent privacy laws can hinder business operations and consumer trust.
#data-breach
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Information security
fromTechCrunch
1 day ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Privacy professionals
fromFast Company
3 days ago

This iPhone trick lets you use ChatGPT without the privacy risks

Using AI chatbots poses risks to privacy and data security, but Siri can help mask identity when accessing ChatGPT on iPhones.
Privacy technologies
fromThe Hacker News
4 days ago

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google's Device Bound Session Credentials enhance security for Chrome users by tying authentication sessions to specific devices, combating session theft.
Privacy professionals
fromSecurityWeek
5 days ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
Privacy professionals
fromWIRED
6 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Information security
fromThe Hacker News
6 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Privacy professionals
fromZDNET
1 week ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
fromSecurityWeek
4 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#vpn
Privacy professionals
fromWIRED
2 weeks ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
#online-privacy
Privacy technologies
fromZDNET
3 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy technologies
fromZDNET
3 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy professionals
fromZDNET
3 weeks ago

Incogni review: The easiest way to remove myself from the internet took just seconds

Incogni is a data removal service that helps reduce personal information exposure by targeting data brokers, with plans starting at $8/month and offering identity protection features.
Privacy technologies
fromSecuritymagazine
3 weeks ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
Privacy professionals
fromMedCity News
3 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Privacy technologies
fromArs Technica
3 weeks ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Privacy professionals
fromWIRED
4 weeks ago

If You Don't Have One, I Recommend a Free Dark Web Monitoring Service

Dark web monitoring services track compromised data across public hacker forums and databases to alert users when their personal information appears in breaches, though most breached data is found on the clear web rather than the dark web itself.
Information security
fromTechzine Global
3 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
#digital-privacy
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
1 month ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy professionals
fromWIRED
1 month ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
Privacy technologies
fromTech Times
1 month ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
Privacy technologies
fromenglish.elpais.com
1 month ago

AI ends online anonymity: the ease of unmasking pseudonymous accounts

Artificial intelligence language models can identify 68% of anonymous social media users with 90% precision, fundamentally undermining online anonymity and privacy protections.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy technologies
fromwww.theguardian.com
1 month ago

AI allows hackers to identify anonymous social media accounts, study finds

Large language models enable malicious actors to efficiently de-anonymize social media users by matching anonymous accounts to real identities using publicly available information.
#ai-deanonymization
Privacy technologies
fromFuturism
1 month ago

AI Can Mass-Unmask Pseudonymous Accounts, Research Paper Finds

AI language models can now easily deanonymize pseudonymous internet users at scale, successfully unmasking two-thirds of tested users across multiple platforms.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Privacy technologies
fromFuturism
1 month ago

AI Can Mass-Unmask Pseudonymous Accounts, Research Paper Finds

AI language models can now easily deanonymize pseudonymous internet users at scale, successfully unmasking two-thirds of tested users across multiple platforms.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Privacy professionals
fromZDNET
1 month ago

How to clean up your digital footprint - and why it matters more than you think

Abandoned social media accounts and old posts create digital vulnerabilities requiring regular maintenance to protect reputation and prevent identity theft or fraud.
Privacy technologies
fromTheregister
1 month ago

AI takes a swing at online anonymity

Large language models can efficiently deanonymize internet users across multiple platforms by automating the process of connecting anonymous posts to identify individuals with high precision.
Information security
fromEmptywheel
2 months ago

"Tor Stinks" ... because It Requires Manual (Digital) Tails

Tor resists systematic de-anonymization; NSA can de-anonymize only a very small fraction manually and cannot reliably combine Tor attacks with passive SIGINT.
fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
fromArs Technica
2 months ago

Upgraded Google safety tools can now find and remove more of your personal info

There are people on the Internet who want to know all about you! Unfortunately, they don't have the best of intentions, but Google has some handy tools to address that, and they've gotten an upgrade today. The "Results About You" tool can now detect and remove more of your personal information. Plus, the tool for removing non-consensual explicit imagery (NCEI) is faster to use. All you have to do is tell Google your personal details first-that seems safe, right?
Privacy technologies
[ Load more ]